A method for detecting the theft of Java']Java programs through analysis of the control flow information

被引:34
作者
Lim, Hyun-il [1 ]
Park, Heewan [1 ]
Choi, Seokwoo [1 ]
Han, Taisook [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Div Comp Sci, Taejon 305701, South Korea
关键词
Software birthmark; Software copyright protection; Software theft detection; !text type='Java']Java[!/text] bytecode analysis;
D O I
10.1016/j.infsof.2009.04.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A software birthmark refers to the inherent characteristics of a program that can be used to identify the program. In this paper, a method for detecting the theft of Java programs through a static software birthmark is proposed that is based on the control flow information. The control flow information shows the structural characteristics and the possible behaviors during the execution of program. Flow paths (FP) and behaviors in Java programs are formally described here, and a set of behaviors of FPs is used as a software birthmark. The similarity is calculated by matching the pairs of similar behaviors from two birthmarks. Experiments centered on the proposed birthmark with respect to precision and recall. The performance was evaluated by analyzing the F-measure curves. The experimental results show that the proposed birthmark is a more effective measure compared to earlier approaches for detecting copied programs. even in cases where such programs are aggressively modified. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1338 / 1350
页数:13
相关论文
共 39 条
[1]  
[Anonymous], THESIS U ARIZONA
[2]  
[Anonymous], 2004, INT S FUT SOFTW TECH
[3]  
Arboit Genevieve, 2002, A Method for Watermarking Java Programs via Opaque Predicates
[4]  
Baeza-Yates R., 1999, Modern information retrieval
[5]  
BOWYER KW, 1999, 29 ANN FRONT ED C, V3
[6]   Glocal alignment: finding rearrangements during alignment [J].
Brudno, Michael ;
Malde, Sanket ;
Poliakov, Alexander ;
Do, Chuong B. ;
Couronne, Olivier ;
Dubchak, Inna ;
Batzoglou, Serafim .
BIOINFORMATICS, 2003, 19 :i54-i62
[7]   Efficient plagiarism detection for large code repositories [J].
Burrows, Steven ;
Tahaghoghi, S. M. M. ;
Zobel, Justin .
SOFTWARE-PRACTICE & EXPERIENCE, 2007, 37 (02) :151-175
[8]  
*BUS SOFTW ALL, 2007, 5 ANN BSA IDC GLOB S
[9]  
COLLBERG C, 1998, PRINCIPLES PROGRAMMI
[10]  
Collberg C., 1999, PRINCIPLES PROGRAMMI